Sciweavers

6239 search results - page 1145 / 1248
» From Zinc to Design Model
Sort
View
CHI
2010
ACM
14 years 5 months ago
Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous
We describe a virtual “tether” for mobile devices that allows groups to have quick, simple and privacy-preserving meetups. Our design provides cues which allow dynamic coordin...
John Williamson, Simon Robinson, Craig Stewart, Ro...
FPGA
2009
ACM
159views FPGA» more  FPGA 2009»
14 years 5 months ago
Choose-your-own-adventure routing: lightweight load-time defect avoidance
Aggressive scaling increases the number of devices we can integrate per square millimeter but makes it increasingly difficult to guarantee that each device fabricated has the inte...
Raphael Rubin, André DeHon
DATE
2009
IEEE
114views Hardware» more  DATE 2009»
14 years 5 months ago
Hardware aging-based software metering
Abstract—Reliable and verifiable hardware, software and content usage metering (HSCM) are of primary importance for wide segments of e-commerce including intellectual property a...
Foad Dabiri, Miodrag Potkonjak
INFOCOM
2009
IEEE
14 years 5 months ago
Delay-Optimal Opportunistic Scheduling and Approximations: The Log Rule
—This paper considers the design of opportunistic packet schedulers for users sharing a time-varying wireless channel from the performance and the robustness points of view. Firs...
Bilal Sadiq, Seung Jun Baek, Gustavo de Veciana
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 5 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
« Prev « First page 1145 / 1248 Last » Next »